ORDER
This cause comes before the Court on defendants’ motion for summáry judgment, to which the plaintiff has responded in opposition. [DE 53, 60]. A hearing was held before the undersigned on November 10, 2014, in Elizabeth City, North Carolina, and the matter is ripe for ruling. For the reasons discussed below, defendants’ motion is GRANTED.
BACKGROUND
Plaintiff originally filed this action alleging a civil rights claim pursuant to 42 U.S.C. § 1983 and a state law tort claim for invasion of privacy. Plaintiff clarified in his motion to dismiss that he has not brought a state law claim for invasion of privacy, thus only the § 1983 claim remains before the Court. [DE 10 at 20]. Plaintiff was a longtime member of the North Carolina Army National Guard, who in 2001, was called to active duty in support of the War Against Terrorism and prompted to full Colonel and Commander of the 139th Rear Operations center. In December 2002, plaintiff was instructed to complete an officer evaluation report of defendant Yon Jess. Defendant Ingram later invalidated that report, and plaintiff filed a complaint regarding'defendant Ingram’s actions with the Department of the Army Inspector General (“DAIG”). In January 2003, plaintiffs unit was again called to active duty and deployed to Camp Doha, Kuwait. On or about November 24, 2003, plaintiff was notified that defendant Ingram had used illegal means to obtain emails sent to plaintiffs personal email account and plaintiff alleges that beginning in May 2003, through December 2003, the email account he accessed while deployed was monitored, intercepted, and forwarded to defendant Yon Jess. In May 2004, plaintiff was notified that he was being investigated for hostile command climate and inappropriate relations with women. A DAIG investigation subsequently substantiated plaintiffs allegations that his email was improperly browsed in violation of Army regulations, but determined that the information contained in the email could be used in the investigation. [DE 2-1 at 2-3]. The DAIG subsequently found six allegations of active duty misconduct by plaintiff were substantiated, and provided its findings to the North Carolina Governor and to defendant Ingram. [DE 55-1 at 10-13]. In June 2005, defendant Ingram forwarded the findings to the Commander, First U.S. Army Lieutenant General. [Id. at 14]. The following month, the Lieutenant General withdrew federal recognition from plaintiff. [Id. at 15-16]. On July 28, 2005, plaintiff waived a hearing on this withdrawal of federal recognition and elected' to transfer to the retired reserve. [Id. at 19].
Plaintiff filed a civil action in this Court on April 27, 2006, alleging the same claims as here, as well as a claim under Bivens v. Six Unknown Named Agents of Federal Bureau of Narcotics,
Plaintiff then returned to this Court on March 31, 2008, by filing a motion pursuant to Federal Rule of Civil Procedure
Plaintiff seeks (1) a declaration that each defendant’s actions were unlawful; (2) to enjoin each defendant from such illegal conduct in the future; (3) to enjoin each defendant from retaliating against him; (4) to mandate reinstatement of plaintiffs military fringe benefits and seniority rights; and (5) damages including but not limited to his back wages.
DISCUSSION
Summary judgment is proper only when, viewing the facts in the light most favorable to the non-moving party, there is no genuine issue of material fact, and the movant is entitled to judgment as a matter of law. Fed.R.Civ.P. 56; Celotex Corp. v. Catrett,
I. Justiciability
Members of the armed services may not maintain suits against the government for injuries that “arise out of or in
In this case, plaintiff in this case seeks both equitable relief and damages.
It is worth noting that this Court dismissed a companion case stemming pursuant to the Mindes doctrine in 2005. Cul-breth v. Ingram,
Plaintiff alleges deprivation of his constitutional rights, thereby meeting Mindes’s first threshold requirement. Mindes also requires “exhaustion of available intraser-vice corrective measures.”
The first factor involves the nature and strength of plaintiffs challenge to the military determination. Mindes, 453 F.2d
Plaintiffs Fourth Amendment claim is weak. The Fourth Amendment protects the right of people to be secure in their “persons, houses, papers, and effects” from unreasonable searches and seizures. A search occurs for purposes of the Fourth Amendment when the government violates a person’s reasonable expectation of privacy. Katz v. United States,
The evidence is undisputed that Army Regulation 380-19 was in effect at the time of the email monitoring in question. Army Regulation 380-19 states that:
Notification procedures, per AR 380-53, will be established to ensure that all users of official DOD systems within the Army understand that their use of DOD systems constitutes consent to security monitoring. The following banner will be included as part of the log-on screens on all computer systems:
ATTENTION!
THIS IS A DOD COMPUTER SYSTEM. BEFORE PROCESSING CLASSIFIED INFORMATION, CHECK THE SECURITY ACCREDITATION LEVEL OF THIS SYSTEM. DO NOT PROCESS, STORE, OR TRANSMIT INFORMATION CLASSIFIED ABOVE THE ACCREDITATION LEVEL OF THIS SYSTEM. THIS COMPUTER SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES (INCLUDES INTERNET ACCESS) ARE PROVIDED ONLY FOR AUTHORIZED U.S. GOVERNMENT USE. DOD COMPUTER SYSTEMS MAY BE MONITORED FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THEIR USE IS AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES, SURVIVABILITY, AND OPERATIONAL SECURITY. MONITORING INCLUDES, BUT IS NOT LIMITED TO, ACTIVE ATTACKS BY AUTHORIZED DOD ENTITIES TO TEST OR VERIFY THE SECURITY OF THIS SYSTEM. DURING MONITORING, INFORMATION MAY BE EXAMINED, RECORDED, COPIED, AND USED FOR AUTHORIZED PURPOSES. ALL INFORMATION, INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT*569 OYER THIS SYSTEM MAY BE MONITORED. USE OF THIS DOD COMPUTER SYSTEM, AUTHORIZED OR UNAUTHORIZED, CONSTITUTES CONSENT TO MONITORING. UNAUTHORIZED USE OF THIS DOD COMPUTER SYSTEM MAY SUBJECT YOU TO CRIMINAL PROSECUTION. EVIDENCE OF UNAUTHORIZED USE COLLECTED DURING MONITORING MAY BE USED FOR ADMINISTRATIVE, CRIMINAL, OR OTHER ADVERSE ACTION. USE OF THIS SYSTEM CONSTITUTES CONSENT TO MONITORING FOR ALL LAWFUL PURPOSES.
Accordingly plaintiff was on notice that his email would be monitored, and it would have been unreasonable for him to expect his email to remain private. Moreover, although “the Fourth Amendment protects people, not places,” the forum in which a challenged activity occurs affects what can reasonably be expected to remain private. Katz,
Even if the Court found that he had a reasonable expectation of privacy in his email, however, liability attaches under § 1983 only where a defendant “acted personally in the deprivation of the plaintiffs rights. The doctrine of respondeat superi- or has no application under this section.” Wright v. Collins,
The second Mindes factor examines the potential injury to plaintiff if judicial review is found inappropriate. Plaintiff waived the opportunity to contest the withdrawal of federal recognition. He qualified for United States Army retirement in the grade of full Colonel, is on the Army retired list, and is drawing federal retirement. Under federal law, plaintiff was required to retire when he obtained his mandatory retirement date at thirty years of credible commissioned service. 10 U.S.C. § 14507. Though he was quite close to his' mandatory retirement date, he had not reached it when he retired, therefore his pay is lower than it would have
The third Mindes factor requires consideration of the type and degree of interference with military function, while the fourth Mindes factor looks to the extent to which the exercise of military discretion is involved. The two are generally considered together. Culbreth v. Ingram,
Here, three of the four Mindes factors weigh against judicial review. Accordingly, the Court finds that the Mindes doctrine requires the Court to grant summary judgment in favor of defendants for lack of jurisdiction. Although this means plaintiffs potential injury will go without review, “the fact that the [Mindes ]' doctrine may in many cases lead to undeniably harsh results does not relieve this court of its obligation to apply precedent.”. Appelhans v. United States,
II. Immunity
In the alternative, even if judicial review were appropriate, sovereign immunity bars relief against either defendant in his official capacity and qualified immunity bars relief against monetary relief against either defendant in his individual capacity.
A. Sovereign Immunity
The Eleventh Amendment bars suit “in law or in equity” against the State or a state official sued in his official capacity. The only exception is that provided in Ex parte Young,
Accordingly, plaintiff seeks no money damages from either defendant in his official capacity, but argues that his
Plaintiff fails to prove an ongoing violation of federal or constitutional law. The monitoring of the workplace email records in question was a one-time occurrence in 2003. No facts have been alleged that either defendant has taken similar action in the intervening decade as to plaintiff. Neither has plaintiff alleged any facts that demonstrate either defendant is capable of such prospective conduct as to him, since neither defendant is currently part of the North Carolina National Guard. Nor has plaintiff proven that there is a National Guard practice that requires his emails to be monitored in violation of the Fourth Amendment. Accordingly, there is no basis on which to impose prospective injunctive relief against the National Guard or either defendant.
Plaintiff also fails to prove that the requested relief is prospective. By definition, a declaration that past conduct was illegal is not prospective. Manning v. S.C. Dep’t of Highway and Pub. Transp.,
B. Qualified Immunity ■
Qualified immunity likewise bars any monetary relief against defendants in their individual capacities. “[Government officials performing discretionary functions generally are granted a qualified immunity and are shielded from liability for civil damages insofar as their conduct does not violate clearly established statutory or constitutional rights of which a reasonable person would have known.” Wilson v. Layne,
Defendants are entitled to qualified immunity because they were not involved, directly or indirectly, in the monitoring in Kuwait. Moreover, the DAIG’s investigation concluded as much. [DE 55-1 at 10-13]. The DAIG specifically found that de
The objective reasonableness of defendants’ actions is underscored by the fact that these events took place in 2003. As late as 2010, there was a lack of clarity regarding privacy actions in electronic workplace communications. Braun,
CONCLUSION
For the aforementioned reasons, defendants’ motion for summary judgment is GRANTED. The Clerk is DIRECTED to close the file.
SO ORDERED.
Notes
. Plaintiff acknowledges that the Eleventh Amendment protects defendants from suit for federal damages in their official capacities. Will v. Michigan Dep’t of State Police,
